Movatterモバイル変換


[0]ホーム

URL:


US20040064537A1 - Method and apparatus to enable efficient processing and transmission of network communications - Google Patents

Method and apparatus to enable efficient processing and transmission of network communications
Download PDF

Info

Publication number
US20040064537A1
US20040064537A1US10/262,351US26235102AUS2004064537A1US 20040064537 A1US20040064537 A1US 20040064537A1US 26235102 AUS26235102 AUS 26235102AUS 2004064537 A1US2004064537 A1US 2004064537A1
Authority
US
United States
Prior art keywords
item
signature
network
network transmission
database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US10/262,351
Other versions
US7188173B2 (en
Inventor
Andrew Anderson
Scott Robinson
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Intel Corp
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IndividualfiledCriticalIndividual
Priority to US10/262,351priorityCriticalpatent/US7188173B2/en
Assigned to INTEL CORPORATIONreassignmentINTEL CORPORATIONASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: ROBINSON, SCOTT H., ANDERSON, ANDREW V.
Publication of US20040064537A1publicationCriticalpatent/US20040064537A1/en
Application grantedgrantedCritical
Publication of US7188173B2publicationCriticalpatent/US7188173B2/en
Adjusted expirationlegal-statusCritical
Expired - Fee Relatedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A method and apparatus to enable efficient processing and transmission of network communications are described. A network transmission directed to one or more destination nodes within a network is received. One or more network transmission items are identified in the network transmission. One or more item signatures associated with the one or more network transmission items are generated. Finally, a determination is made whether the one or more network transmission items can be transmitted to the one or more destination nodes by further processing the one or more item signatures.

Description

Claims (53)

What is claimed is:
1. A method comprising:
receiving a network transmission directed to at least one destination node within a network;
identifying at least one network transmission item in said network transmission;
generating at least one item signature associated with said at least one network transmission item; and
determining whether said at least one network transmission item can be transmitted to said at least one destination node by further processing said at least one item signature.
2. The method according toclaim 1, wherein said determining further comprises:
comparing said at least one item signature to each signature of a plurality of signatures stored in at least one signature database;
storing said at least one item signature in said at least one signature database if no match exists between said at least one item signature and said each signature; and selectively transmitting said at least one network transmission item to said at least one destination node, if said network is an internal network.
3. The method according toclaim 2, further comprising:
storing item metadata information associated with said at least one network transmission item together with said at least one item signature in said at least one signature database.
4. The method according toclaim 1, wherein said determining further comprises:
comparing said at least one item signature to each signature of a plurality of signatures stored in at least one signature database; and
selectively transmitting said at least one network transmission item to said at least one destination node, if said network is an external network and said at least one item signature matches a signature within said at least one signature database.
5. The method according toclaim 4, wherein said transmitting further comprises:
comparing item metadata information associated with said at least one network transmission item to metadata stored within said at least one item database and corresponding to said signature; and
transmitting said at least one network transmission item to said at least one destination node, if said metadata does not prohibit transmission of said at least one network transmission item.
6. The method according toclaim 5, wherein said metadata is inserted within said at least one signature database in conjunction with said each signature of said plurality of signatures.
7. The method according toclaim 4, wherein said transmitting further comprises:
comparing item metadata information associated with said at least one network transmission item to metadata stored within said at least one item database and corresponding to said signature; and
blocking transmission of said at least one network transmission item to said at least one destination node, if said metadata prohibits said transmission.
8. The method according toclaim 1, wherein said determining further comprises:
comparing said at least one item signature to each signature of a plurality of signatures stored in at least one signature database; and
transmitting said at least one network transmission item to a processing module for further processing, if said network is an external network and said at least one item signature does not match a signature within said at least one signature database.
9. The method according toclaim 8, further comprising:
blocking said at least one network transmission item from being transmitted to said at least one destination node.
10. The method according toclaim 8, further comprising:
selectively transmitting said at least one network transmission item to said at least one destination node; and
inserting said at least one item signature in said at least one signature database.
11. The method according toclaim 8, further comprising:
logging said at least one network transmission item in a log database.
12. The method according toclaim 1, wherein said at least one item signature further comprises a cryptographic hash algorithm.
13. An apparatus comprising:
at least one communication parser to receive a network transmission directed to at least one destination node within a network and to identify at least one network transmission item in said network transmission;
a signature generator coupled to said at least one communication parser to generate at least one item signature associated with said at least one network transmission item; and
a filter module coupled to said signature generator to determine whether said at least one network transmission item can be transmitted to said at least one destination node by further processing said at least one item signature.
14. The apparatus according toclaim 13, wherein said filter module further compares said at least one item signature to each signature of a plurality of signatures stored in at least one signature database, stores said at least one item signature in said at least one signature database if no match exists between said at least one item signature and said each signature, and selectively transmits said at least one network transmission item to said at least one destination node, if said network is an internal network.
15. The apparatus according toclaim 14, wherein said filter module further stores item metadata information associated with said at least one network transmission item together with said at least one item signature in said at least one signature database.
16. The apparatus according toclaim 13, wherein said filter module further compares said at least one item signature to each signature of a plurality of signatures stored in at least one signature database and selectively transmits said at least one network transmission item to said at least one destination node, if said network is an external network and said at least one item signature matches a signature within said at least one signature database.
17. The apparatus according toclaim 16, wherein said filter module further compares item metadata information associated with said at least one network transmission item to metadata stored within said at least one item database and corresponding to said signature, and further transmits said at least one network transmission item to said at least one destination node, if said metadata does not prohibit transmission of said at least one network transmission item.
18. The apparatus according toclaim 17, wherein said metadata is inserted within said at least one signature database in conjunction with said each signature of said plurality of signatures.
19. The apparatus according toclaim 16, wherein said filter module further compares item metadata information associated with said at least one network transmission item to metadata stored within said at least one item database and corresponding to said signature, and blocks transmission of said at least one network transmission item to said at least one destination node, if said metadata prohibits said transmission.
20. The apparatus according toclaim 13, wherein said filter module further compares said at least one item signature to each signature of a plurality of signatures stored in at least one signature database and further transmits said at least one network transmission item to a processing module coupled to said filter module for further processing, if said network is an external network and said at least one item signature does not match a signature within said at least one signature database.
21. The apparatus according toclaim 20, wherein said processing module further blocks said at least one network transmission item from being transmitted to said at least one destination node.
22. The apparatus according toclaim 20, wherein said processing module further transmits selectively said at least one network transmission item to said at least one destination node and inserts said at least one item signature in said at least one signature database.
23. The apparatus according toclaim 20, wherein said processing module further logs said at least one network transmission item in a log database.
24. The apparatus according toclaim 13, wherein said at least one item signature further comprises a cryptographic hash algorithm.
25. A system comprising:
a memory; and
a processor coupled to said memory to receive a network transmission directed to at least one destination node within a network, to identify at least one network transmission item in said network transmission, to generate at least one item signature associated with said at least one network transmission item, and to determine whether said at least one network transmission item can be transmitted to said at least one destination node by further processing said at least one item signature.
26. The system according toclaim 25, wherein said processor compares said at least one item signature to each signature of a plurality of signatures stored in at least one signature database within said memory, stores said at least one item signature in said at least one signature database if no match exists between said at least one item signature and said each signature, and selectively transmits said at least one network transmission item to said at least one destination node, if said network is an internal network.
27. The system according toclaim 26, wherein said processor further stores item metadata information associated with said at least one network transmission item together with said at least one item signature in said at least one signature database.
28. The system according toclaim 25, wherein said processor further compares said at least one item signature to each signature of a plurality of signatures stored in at least one signature database and selectively transmits said at least one network transmission item to said at least one destination node, if said network is an external network and said at least one item signature matches a signature within said at least one signature database.
29. The system according toclaim 28, wherein said processor further compares item metadata information associated with said at least one network transmission item to metadata stored within said at least one item database and corresponding to said signature, and further transmits said at least one network transmission item to said at least one destination node, if said metadata does not prohibit transmission of said at least one network transmission item.
30. The system according toclaim 29, wherein said metadata is inserted within said at least one signature database in conjunction with said each signature of said plurality of signatures.
31. The system according toclaim 28, wherein said processor further compares item metadata information associated with said at least one network transmission item to metadata stored within said at least one item database and corresponding to said signature, and blocks transmission of said at least one network transmission item to said at least one destination node, if said metadata prohibits said transmission.
32. An apparatus comprising:
means for receiving a network transmission directed to at least one destination node within a network;
means for identifying at least one network transmission item in said network transmission;
means for generating at least one item signature associated with said at least one network transmission item; and
means for determining whether said at least one network transmission item can be transmitted to said at least one destination node by further processing said at least one item signature.
33. The apparatus according toclaim 32, further comprising:
means for comparing said at least one item signature to each signature of a plurality of signatures stored in at least one signature database;
means for storing said at least one item signature in said at least one signature database if no match exists between said at least one item signature and said each signature; and
means for selectively transmitting said at least one network transmission item to said at least one destination node, if said network is an internal network.
34. The apparatus according toclaim 33, further comprising:
means for storing item metadata information associated with said at least one network transmission item together with said at least one item signature in said at least one signature database.
35. The apparatus according toclaim 32, further comprising:
means for comparing said at least one item signature to each signature of a plurality of signatures stored in at least one signature database; and
means for selectively transmitting said at least one network transmission item to said at least one destination node, if said network is an external network and said at least one item signature matches a signature within said at least one signature database.
36. The apparatus according toclaim 35, further comprising:
means for comparing item metadata information associated with said at least one network transmission item to metadata stored within said at least one item database and corresponding to said signature; and
means for transmitting said at least one network transmission item to said at least one destination node, if said metadata does not prohibit transmission of said at least one network transmission item.
37. The apparatus according toclaim 36, wherein said metadata is inserted within said at least one signature database in conjunction with said each signature of said plurality of signatures.
38. The apparatus according toclaim 35, further comprising:
means for comparing item metadata information associated with said at least one network transmission item to metadata stored within said at least one item database and corresponding to said signature; and
means for blocking transmission of said at least one network transmission item to said at least one destination node, if said metadata prohibits said transmission.
39. The apparatus according toclaim 32, further comprising:
means for comparing said at least one item signature to each signature of a plurality of signatures stored in at least one signature database; and
means for transmitting said at least one network transmission item to a processing module for further processing, if said network is an external network and said at least one item signature does not match a signature within said at least one signature database.
40. The apparatus according toclaim 39, further comprising:
means for blocking said at least one network transmission item from being transmitted to said at least one destination node.
41. The apparatus according toclaim 39, further comprising:
means for selectively transmitting said at least one network transmission item to said at least one destination node; and
means for inserting said at least one item signature in said at least one signature database.
42. The apparatus according toclaim 39, further comprising:
means for logging said at least one network transmission item in a log database.
43. A computer readable medium containing executable instructions, which, when executed in a processing system, cause said processing system to perform a method comprising:
receiving a network transmission directed to at least one destination node within a network;
identifying at least one network transmission item in said network transmission;
generating at least one item signature associated with said at least one network transmission item; and
determining whether said at least one network transmission item can be transmitted to said at least one destination node by further processing said at least one item signature.
44. The computer readable medium according toclaim 43, wherein said determining further comprises:
comparing said at least one item signature to each signature of a plurality of signatures stored in at least one signature database;
storing said at least one item signature in said at least one signature database if no match exists between said at least one item signature and said each signature; and
selectively transmitting said at least one network transmission item to said at least one destination node, if said network is an internal network.
45. The computer readable medium according toclaim 44, wherein said method further comprises:
storing item metadata information associated with said at least one network transmission item together with said at least one item signature in said at least one signature database.
46. The computer readable medium according toclaim 43, wherein said determining further comprises:
comparing said at least one item signature to each signature of a plurality of signatures stored in at least one signature database; and
selectively transmitting said at least one network transmission item to said at least one destination node, if said network is an external network and said at least one item signature matches a signature within said at least one signature database.
47. The computer readable medium according toclaim 46, wherein said transmitting further comprises:
comparing item metadata information associated with said at least one network transmission item to metadata stored within said at least one item database and corresponding to said signature; and
transmitting said at least one network transmission item to said at least one destination node, if said metadata does not prohibit transmission of said at least one network transmission item.
48. The computer readable medium according toclaim 47, wherein said metadata is inserted within said at least one signature database in conjunction with said each signature of said plurality of signatures.
49. The computer readable medium according toclaim 46, wherein said transmitting further comprises:
comparing item metadata information associated with said at least one network transmission item to metadata stored within said at least one item database and corresponding to said signature; and
blocking transmission of said at least one network transmission item to said at least one destination node, if said metadata prohibits said transmission.
50. The computer readable medium according toclaim 43, wherein said determining further comprises:
comparing said at least one item signature to each signature of a plurality of signatures stored in at least one signature database; and
transmitting said at least one network transmission item to a processing module for further processing, if said network is an external network and said at least one item signature does not match a signature within said at least one signature database.
51. The computer readable medium according toclaim 50, wherein said method further comprises:
blocking said at least one network transmission item from being transmitted to said at least one destination node.
52. The computer readable medium according toclaim 50, wherein said method further comprises:
selectively transmitting said at least one network transmission item to said at least one destination node; and
inserting said at least one item signature in said at least one signature database.
53. The computer readable medium according toclaim 50, wherein said method further comprises:
logging said at least one network transmission item in a log database.
US10/262,3512002-09-302002-09-30Method and apparatus to enable efficient processing and transmission of network communicationsExpired - Fee RelatedUS7188173B2 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US10/262,351US7188173B2 (en)2002-09-302002-09-30Method and apparatus to enable efficient processing and transmission of network communications

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US10/262,351US7188173B2 (en)2002-09-302002-09-30Method and apparatus to enable efficient processing and transmission of network communications

Publications (2)

Publication NumberPublication Date
US20040064537A1true US20040064537A1 (en)2004-04-01
US7188173B2 US7188173B2 (en)2007-03-06

Family

ID=32030198

Family Applications (1)

Application NumberTitlePriority DateFiling Date
US10/262,351Expired - Fee RelatedUS7188173B2 (en)2002-09-302002-09-30Method and apparatus to enable efficient processing and transmission of network communications

Country Status (1)

CountryLink
US (1)US7188173B2 (en)

Cited By (57)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20050080642A1 (en)*2003-10-142005-04-14Daniell W. ToddConsolidated email filtering user interface
US20050080860A1 (en)*2003-10-142005-04-14Daniell W. ToddPhonetic filtering of undesired email messages
US20050080889A1 (en)*2003-10-142005-04-14Malik Dale W.Child protection from harmful email
US20050091321A1 (en)*2003-10-142005-04-28Daniell W. T.Identifying undesired email messages having attachments
US20050097174A1 (en)*2003-10-142005-05-05Daniell W. T.Filtered email differentiation
US20050273850A1 (en)*2004-06-072005-12-08Check Point Software Technologies, Inc.Security System with Methodology Providing Verified Secured Individual End Points
US20060005037A1 (en)*2004-02-262006-01-05Metavante CorporationNon-algorithmic vectored steganography
US20060130118A1 (en)*2004-12-102006-06-15AlcatelDistributive system for marking and blocking video and audio content related to video and audio programs
US20070073869A1 (en)*2005-08-262007-03-29Hon Hai Precision Industry Co., Ltd.System and method for transmitting data
US20070083606A1 (en)*2001-12-052007-04-12Bellsouth Intellectual Property CorporationForeign Network Spam Blocker
US20070089171A1 (en)*2003-12-302007-04-19Leeor AharonUniversal worm catcher
US20070118759A1 (en)*2005-10-072007-05-24Sheppard Scott KUndesirable email determination
US20070198642A1 (en)*2003-06-302007-08-23Bellsouth Intellectual Property CorporationFiltering Email Messages Corresponding to Undesirable Domains
US20070203912A1 (en)*2006-02-282007-08-30Thuve Matthew LEngineering manufacturing analysis system
US20070206609A1 (en)*2003-09-122007-09-06Janne PeisaData Sharing in a Multimedia Communication System
US20070287433A1 (en)*2006-06-082007-12-13Maurice WollersheimDevice detection in mobile networks
US20080037423A1 (en)*2006-08-082008-02-14Pradeep SinghMapping Off-Network Traffic to an Administered Network
US20080141346A1 (en)*2006-12-112008-06-12Microsoft CorporationMail server coordination activities using message metadata
US20080189273A1 (en)*2006-06-072008-08-07Digital Mandate, LlcSystem and method for utilizing advanced search and highlighting techniques for isolating subsets of relevant content data
US20080285560A1 (en)*2007-05-182008-11-20International Business Machines CorporationSystem, method and program for making routing decisions
US20090129288A1 (en)*2003-10-012009-05-21Symantec CorporationNetwork traffic identification by waveform analysis
US20090172815A1 (en)*2007-04-042009-07-02Guofei GuMethod and apparatus for detecting malware infection
US7624435B1 (en)*2004-07-262009-11-24Trend Micro IncorporatedMethod and apparatus for managing digital assets
US20110145269A1 (en)*2009-12-092011-06-16Renew Data Corp.System and method for quickly determining a subset of irrelevant data from large data content
US20110208861A1 (en)*2004-06-232011-08-25Mcafee, Inc.Object classification in a capture system
US8065277B1 (en)2003-01-172011-11-22Daniel John GardnerSystem and method for a data extraction and backup database
US8069151B1 (en)2004-12-082011-11-29Chris CraffordSystem and method for detecting incongruous or incorrect media in a data recovery process
EP2393256A1 (en)*2010-06-042011-12-07Broadcom CorporationMethod and system for content filtering in a broadband gateway
US8127365B1 (en)2009-11-162012-02-28Trend Micro IncorporatedOrigination-based content protection for computer systems
US8150827B2 (en)2006-06-072012-04-03Renew Data Corp.Methods for enhancing efficiency and cost effectiveness of first pass review of documents
US20120089626A1 (en)*2010-10-122012-04-12Harold Theodore GoransonMethod and apparatus providing for processing and normalization of metadata
US8375008B1 (en)2003-01-172013-02-12Robert GomesMethod and system for enterprise-wide retention of digital or electronic data
US8424091B1 (en)2010-01-122013-04-16Trend Micro IncorporatedAutomatic local detection of computer security threats
US20130103804A1 (en)*2005-11-072013-04-25Flurry, Inc.Delivering a Customized Service to a Mobile Device Using a Link
CN103209190A (en)*2013-04-232013-07-17深圳市京华科讯科技有限公司Desktop all-in-one machine access gateway and implementation method thereof
US8527468B1 (en)2005-02-082013-09-03Renew Data Corp.System and method for management of retention periods for content in a computing system
US20130246338A1 (en)*2006-09-152013-09-19Ashok DoddapaneniSystem and method for indexing a capture system
US8615490B1 (en)2008-01-312013-12-24Renew Data Corp.Method and system for restoring information from backup storage media
US8630984B1 (en)2003-01-172014-01-14Renew Data Corp.System and method for data extraction from email files
US8640251B1 (en)2011-12-142014-01-28Trend Micro IncorporatedMethods and systems for classifying computer documents into confidential levels using log information
US20140032919A1 (en)*2003-12-102014-01-30Ratinder Paul Singh AhujaDocument de-registration
US20140029615A1 (en)*2012-07-262014-01-30Christopher BaldwinNetwork-based content filtering utilizing user-specified parameters
US8738668B2 (en)2009-12-162014-05-27Renew Data Corp.System and method for creating a de-duplicated data set
US8826452B1 (en)2012-01-182014-09-02Trend Micro IncorporatedProtecting computers against data loss involving screen captures
US20140331046A1 (en)*2013-05-032014-11-06Santhosh KrishnamurthyVirtual desktop accelerator with support for multiple cryptographic contexts
US8943024B1 (en)*2003-01-172015-01-27Daniel John GardnerSystem and method for data de-duplication
US20150205877A1 (en)*2005-12-212015-07-23Digimarc CorporationRules driven pan id metadata routing system and network
US9092471B2 (en)2003-12-102015-07-28Mcafee, Inc.Rule parser
US9094338B2 (en)2006-05-222015-07-28Mcafee, Inc.Attributes of captured objects in a capture system
US9195937B2 (en)2009-02-252015-11-24Mcafee, Inc.System and method for intelligent state management
US9253154B2 (en)2008-08-122016-02-02Mcafee, Inc.Configuration management for a capture/registration system
US9313232B2 (en)2009-03-252016-04-12Mcafee, Inc.System and method for data mining and security policy management
US9430564B2 (en)2011-12-272016-08-30Mcafee, Inc.System and method for providing data protection workflows in a network environment
US9794254B2 (en)2010-11-042017-10-17Mcafee, Inc.System and method for protecting specified data combinations
US20180174094A1 (en)*2016-12-152018-06-21International Business Machines CorporationBlockchain-based food product shelf-life management
US11063701B2 (en)*2018-07-132021-07-13Encore Semi, Inc.Safety integrity level of service (SILoS) system
CN113839964A (en)*2021-11-262021-12-24浙江国利信安科技有限公司Communication method for gateway device and gateway device

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JP4343551B2 (en)*2003-02-252009-10-14パイオニア株式会社 Information provision system and information provision program
US7907544B2 (en)*2003-03-142011-03-15Hewlett-Packard Development Company, L.P.Overlay network for location-independent communication between computer systems
US20060015630A1 (en)*2003-11-122006-01-19The Trustees Of Columbia University In The City Of New YorkApparatus method and medium for identifying files using n-gram distribution of data
GB0513375D0 (en)2005-06-302005-08-03Retento LtdComputer security
EP1924944A4 (en)*2005-09-122012-11-07Sand Box Technologies IncSystem and method for controlling distribution of electronic information
US8966630B2 (en)*2006-04-272015-02-24The Invention Science Fund I, LlcGenerating and distributing a malware countermeasure
US8539581B2 (en)*2006-04-272013-09-17The Invention Science Fund I, LlcEfficient distribution of a malware countermeasure
US8117654B2 (en)*2006-06-302012-02-14The Invention Science Fund I, LlcImplementation of malware countermeasures in a network device
US9258327B2 (en)2006-04-272016-02-09Invention Science Fund I, LlcMulti-network virus immunization
US8613095B2 (en)*2006-06-302013-12-17The Invention Science Fund I, LlcSmart distribution of a malware countermeasure
WO2008052291A2 (en)*2006-11-032008-05-08Intelliguard I.T. Pty LtdSystem and process for detecting anomalous network traffic
US7644150B1 (en)*2007-08-222010-01-05Narus, Inc.System and method for network traffic management
US8510551B1 (en)*2008-11-102013-08-13Juniper Networks, Inc.Policy handling for multicast transmissions
US9141692B2 (en)*2009-03-052015-09-22International Business Machines CorporationInferring sensitive information from tags
WO2011082489A1 (en)*2010-01-062011-07-14Vitrium Systems Inc.Method and system of providing a viewing experience with respect to a document having read-only content
US20120260304A1 (en)*2011-02-152012-10-11Webroot Inc.Methods and apparatus for agent-based malware management
US8881258B2 (en)2011-08-242014-11-04Mcafee, Inc.System, method, and computer program for preventing infections from spreading in a network environment using dynamic application of a firewall policy
CN103096288B (en)*2011-11-022016-03-02中磊电子(苏州)有限公司Use femto cell as the method for exchange
US10162854B2 (en)*2017-03-012018-12-25Disney Enterprises, Inc.Collaborative cloud-based content curation in real-time

Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20020169954A1 (en)*1998-11-032002-11-14Bandini Jean-Christophe DenisMethod and system for e-mail message transmission
US20030033435A1 (en)*2001-07-172003-02-13Hanner Brian D.System and method for multidimensional data compression
US20030046388A1 (en)*2001-09-062003-03-06Milliken Walter ClarkSystems and methods for network performance measurement using packet signature collection

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20020169954A1 (en)*1998-11-032002-11-14Bandini Jean-Christophe DenisMethod and system for e-mail message transmission
US20030033435A1 (en)*2001-07-172003-02-13Hanner Brian D.System and method for multidimensional data compression
US20030046388A1 (en)*2001-09-062003-03-06Milliken Walter ClarkSystems and methods for network performance measurement using packet signature collection

Cited By (95)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20070083606A1 (en)*2001-12-052007-04-12Bellsouth Intellectual Property CorporationForeign Network Spam Blocker
US8090778B2 (en)2001-12-052012-01-03At&T Intellectual Property I, L.P.Foreign network SPAM blocker
US8943024B1 (en)*2003-01-172015-01-27Daniel John GardnerSystem and method for data de-duplication
US8630984B1 (en)2003-01-172014-01-14Renew Data Corp.System and method for data extraction from email files
US8375008B1 (en)2003-01-172013-02-12Robert GomesMethod and system for enterprise-wide retention of digital or electronic data
US8065277B1 (en)2003-01-172011-11-22Daniel John GardnerSystem and method for a data extraction and backup database
US7506031B2 (en)2003-06-302009-03-17At&T Intellectual Property I, L.P.Filtering email messages corresponding to undesirable domains
US20070198642A1 (en)*2003-06-302007-08-23Bellsouth Intellectual Property CorporationFiltering Email Messages Corresponding to Undesirable Domains
US7844678B2 (en)2003-06-302010-11-30At&T Intellectual Property I, L.P.Filtering email messages corresponding to undesirable domains
US20070206609A1 (en)*2003-09-122007-09-06Janne PeisaData Sharing in a Multimedia Communication System
US7835390B2 (en)*2003-10-012010-11-16Symantec CorporationNetwork traffic identification by waveform analysis
US20090129288A1 (en)*2003-10-012009-05-21Symantec CorporationNetwork traffic identification by waveform analysis
US7664812B2 (en)*2003-10-142010-02-16At&T Intellectual Property I, L.P.Phonetic filtering of undesired email messages
US20050080889A1 (en)*2003-10-142005-04-14Malik Dale W.Child protection from harmful email
US7949718B2 (en)2003-10-142011-05-24At&T Intellectual Property I, L.P.Phonetic filtering of undesired email messages
US20050097174A1 (en)*2003-10-142005-05-05Daniell W. T.Filtered email differentiation
US20050091321A1 (en)*2003-10-142005-04-28Daniell W. T.Identifying undesired email messages having attachments
US7930351B2 (en)*2003-10-142011-04-19At&T Intellectual Property I, L.P.Identifying undesired email messages having attachments
US7610341B2 (en)2003-10-142009-10-27At&T Intellectual Property I, L.P.Filtered email differentiation
US20050080860A1 (en)*2003-10-142005-04-14Daniell W. ToddPhonetic filtering of undesired email messages
US20050080642A1 (en)*2003-10-142005-04-14Daniell W. ToddConsolidated email filtering user interface
US7451184B2 (en)2003-10-142008-11-11At&T Intellectual Property I, L.P.Child protection from harmful email
US20100077051A1 (en)*2003-10-142010-03-25At&T Intellectual Property I, L.P.Phonetic Filtering of Undesired Email Messages
US9092471B2 (en)2003-12-102015-07-28Mcafee, Inc.Rule parser
US9374225B2 (en)*2003-12-102016-06-21Mcafee, Inc.Document de-registration
US20140032919A1 (en)*2003-12-102014-01-30Ratinder Paul Singh AhujaDocument de-registration
US20070089171A1 (en)*2003-12-302007-04-19Leeor AharonUniversal worm catcher
US7950059B2 (en)*2003-12-302011-05-24Check-Point Software Technologies Ltd.Universal worm catcher
US7222365B2 (en)*2004-02-262007-05-22Metavante CorporationNon-algorithmic vectored steganography
WO2005082104A3 (en)*2004-02-262007-02-01Metavante CorpNon-algorithmic vectored steganography
US20060005037A1 (en)*2004-02-262006-01-05Metavante CorporationNon-algorithmic vectored steganography
US20050273850A1 (en)*2004-06-072005-12-08Check Point Software Technologies, Inc.Security System with Methodology Providing Verified Secured Individual End Points
US8136149B2 (en)*2004-06-072012-03-13Check Point Software Technologies, Inc.Security system with methodology providing verified secured individual end points
US20110208861A1 (en)*2004-06-232011-08-25Mcafee, Inc.Object classification in a capture system
US7624435B1 (en)*2004-07-262009-11-24Trend Micro IncorporatedMethod and apparatus for managing digital assets
US8069151B1 (en)2004-12-082011-11-29Chris CraffordSystem and method for detecting incongruous or incorrect media in a data recovery process
US8006279B2 (en)*2004-12-102011-08-23Alcatel LucentDistributive system for marking and blocking video and audio content related to video and audio programs
US20060130118A1 (en)*2004-12-102006-06-15AlcatelDistributive system for marking and blocking video and audio content related to video and audio programs
US8527468B1 (en)2005-02-082013-09-03Renew Data Corp.System and method for management of retention periods for content in a computing system
US20070073869A1 (en)*2005-08-262007-03-29Hon Hai Precision Industry Co., Ltd.System and method for transmitting data
US20070118759A1 (en)*2005-10-072007-05-24Sheppard Scott KUndesirable email determination
US10042624B2 (en)*2005-11-072018-08-07Oath Inc.Delivering a customized service to a mobile device by parsing metadata to create a device signature
US20130103804A1 (en)*2005-11-072013-04-25Flurry, Inc.Delivering a Customized Service to a Mobile Device Using a Link
US10887168B2 (en)*2005-11-072021-01-05Verizon Media Inc.Computerized system and method of error handling for customized execution of applications
US20150205877A1 (en)*2005-12-212015-07-23Digimarc CorporationRules driven pan id metadata routing system and network
US20070203912A1 (en)*2006-02-282007-08-30Thuve Matthew LEngineering manufacturing analysis system
US9094338B2 (en)2006-05-222015-07-28Mcafee, Inc.Attributes of captured objects in a capture system
US8150827B2 (en)2006-06-072012-04-03Renew Data Corp.Methods for enhancing efficiency and cost effectiveness of first pass review of documents
US20080189273A1 (en)*2006-06-072008-08-07Digital Mandate, LlcSystem and method for utilizing advanced search and highlighting techniques for isolating subsets of relevant content data
US20070287433A1 (en)*2006-06-082007-12-13Maurice WollersheimDevice detection in mobile networks
US7860488B2 (en)*2006-06-082010-12-28Markport LimitedDevice detection in mobile networks
US20080037423A1 (en)*2006-08-082008-02-14Pradeep SinghMapping Off-Network Traffic to an Administered Network
US7672238B2 (en)*2006-08-082010-03-02Opnet Technologies, Inc.Mapping off-network traffic to an administered network
US20130246338A1 (en)*2006-09-152013-09-19Ashok DoddapaneniSystem and method for indexing a capture system
US8640201B2 (en)*2006-12-112014-01-28Microsoft CorporationMail server coordination activities using message metadata
US20080141346A1 (en)*2006-12-112008-06-12Microsoft CorporationMail server coordination activities using message metadata
US20090172815A1 (en)*2007-04-042009-07-02Guofei GuMethod and apparatus for detecting malware infection
US10270803B2 (en)2007-04-042019-04-23Sri InternationalMethod and apparatus for detecting malware infection
US8955122B2 (en)*2007-04-042015-02-10Sri InternationalMethod and apparatus for detecting malware infection
US8982887B2 (en)2007-05-182015-03-17International Business Machines CorporationSystem, method and program for making routing decisions
US20080285560A1 (en)*2007-05-182008-11-20International Business Machines CorporationSystem, method and program for making routing decisions
US8615490B1 (en)2008-01-312013-12-24Renew Data Corp.Method and system for restoring information from backup storage media
US9253154B2 (en)2008-08-122016-02-02Mcafee, Inc.Configuration management for a capture/registration system
US10367786B2 (en)2008-08-122019-07-30Mcafee, LlcConfiguration management for a capture/registration system
US9602548B2 (en)2009-02-252017-03-21Mcafee, Inc.System and method for intelligent state management
US9195937B2 (en)2009-02-252015-11-24Mcafee, Inc.System and method for intelligent state management
US9313232B2 (en)2009-03-252016-04-12Mcafee, Inc.System and method for data mining and security policy management
US8127365B1 (en)2009-11-162012-02-28Trend Micro IncorporatedOrigination-based content protection for computer systems
US20110145269A1 (en)*2009-12-092011-06-16Renew Data Corp.System and method for quickly determining a subset of irrelevant data from large data content
US8738668B2 (en)2009-12-162014-05-27Renew Data Corp.System and method for creating a de-duplicated data set
US8424091B1 (en)2010-01-122013-04-16Trend Micro IncorporatedAutomatic local detection of computer security threats
CN102523180A (en)*2010-06-042012-06-27美国博通公司Networking method and system
EP2393256A1 (en)*2010-06-042011-12-07Broadcom CorporationMethod and system for content filtering in a broadband gateway
TWI474684B (en)*2010-06-042015-02-21Broadcom CorpMethod and system for content filtering in a broadband gateway
US20120089626A1 (en)*2010-10-122012-04-12Harold Theodore GoransonMethod and apparatus providing for processing and normalization of metadata
US9794254B2 (en)2010-11-042017-10-17Mcafee, Inc.System and method for protecting specified data combinations
US11316848B2 (en)2010-11-042022-04-26Mcafee, LlcSystem and method for protecting specified data combinations
US10666646B2 (en)2010-11-042020-05-26Mcafee, LlcSystem and method for protecting specified data combinations
US10313337B2 (en)2010-11-042019-06-04Mcafee, LlcSystem and method for protecting specified data combinations
US8640251B1 (en)2011-12-142014-01-28Trend Micro IncorporatedMethods and systems for classifying computer documents into confidential levels using log information
US9430564B2 (en)2011-12-272016-08-30Mcafee, Inc.System and method for providing data protection workflows in a network environment
US8826452B1 (en)2012-01-182014-09-02Trend Micro IncorporatedProtecting computers against data loss involving screen captures
US9385946B2 (en)*2012-07-262016-07-05At&T Intellectual Property I, L.P.Network-based content filtering utilizing user-specified parameters
US20140029615A1 (en)*2012-07-262014-01-30Christopher BaldwinNetwork-based content filtering utilizing user-specified parameters
CN103209190A (en)*2013-04-232013-07-17深圳市京华科讯科技有限公司Desktop all-in-one machine access gateway and implementation method thereof
US9660961B2 (en)2013-05-032017-05-23Dell Products L.P.Virtual desktop accelerator with enhanced bandwidth usage
US9553847B2 (en)2013-05-032017-01-24Dell Products L.P.Virtual desktop accelerator with support for multiple cryptographic contexts
US9485220B2 (en)2013-05-032016-11-01Dell Products L.P.Virtual desktop accelerator with support for dynamic proxy thread management
US9313297B2 (en)2013-05-032016-04-12Dell Products L.P.Virtual desktop accelerator with support for dynamic proxy thread management
US20140331046A1 (en)*2013-05-032014-11-06Santhosh KrishnamurthyVirtual desktop accelerator with support for multiple cryptographic contexts
US9300762B2 (en)*2013-05-032016-03-29Dell Products L.P.Virtual desktop accelerator with support for multiple cryptographic contexts
US20180174094A1 (en)*2016-12-152018-06-21International Business Machines CorporationBlockchain-based food product shelf-life management
US11423351B2 (en)*2016-12-152022-08-23International Business Machines CorporationBlockchain-based food product shelf-life management
US11063701B2 (en)*2018-07-132021-07-13Encore Semi, Inc.Safety integrity level of service (SILoS) system
CN113839964A (en)*2021-11-262021-12-24浙江国利信安科技有限公司Communication method for gateway device and gateway device

Also Published As

Publication numberPublication date
US7188173B2 (en)2007-03-06

Similar Documents

PublicationPublication DateTitle
US7188173B2 (en)Method and apparatus to enable efficient processing and transmission of network communications
EP1634175B1 (en)Multilayer access control security system
US7882555B2 (en)Application layer security method and system
Burger et al.Taxonomy model for cyber threat intelligence information exchange technologies
US8271794B2 (en)Verifying captured objects before presentation
US7706378B2 (en)Method and apparatus for processing network packets
US7313822B2 (en)Application-layer security method and system
US9525696B2 (en)Systems and methods for processing data flows
US8402540B2 (en)Systems and methods for processing data flows
US8010469B2 (en)Systems and methods for processing data flows
CN110362992B (en)Method and apparatus for blocking or detecting computer attacks in cloud-based environment
US9800608B2 (en)Processing data flows with a data flow processor
CN1656731B (en) Network security system and method based on multi-method gateway
US20050228984A1 (en)Web service gateway filtering
US20140164442A1 (en)Rule parser
US20120026881A1 (en)Packet classification in a network security device
US20110238855A1 (en)Processing data flows with a data flow processor
AU2002252371A1 (en)Application layer security method and system
WO2007070838A2 (en)Systems and methods for processing data flows
US20090328188A1 (en)Context-based semantic firewall for the protection of information
Li et al.Practical privacy‐preserving deep packet inspection outsourcing
ParekhPrivacy-preserving distributed event corroboration
Jamil et al.Multi-tier MIHIDS: Integrating CTI for UAV Security Enhancement
Liu et al.Cross-Domain Privacy-Preserving Cooperative Firewall Optimization
SchearThe Design and Implementation of Glavlit: A Transparent Data Confinement System

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:INTEL CORPORATION, CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ANDERSON, ANDREW V.;ROBINSON, SCOTT H.;REEL/FRAME:013671/0547;SIGNING DATES FROM 20030107 TO 20030108

FPAYFee payment

Year of fee payment:4

REMIMaintenance fee reminder mailed
LAPSLapse for failure to pay maintenance fees
STCHInformation on status: patent discontinuation

Free format text:PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FPLapsed due to failure to pay maintenance fee

Effective date:20150306


[8]ページ先頭

©2009-2025 Movatter.jp